Kernel Mode Cryptographic Primitives Library

Certificate #4515

Webpage information ?

Status active
Validation dates 08.05.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #4339 operating in FIPS mode, Windows Resume validated to FIPS 140-2 under Cert. #4348 operating in FIPS mode, or TCB Launcher validated to FIPS 140-2 under Cert. #4457 operating in FIPS mode.
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 2
Description Kernel Mode Cryptographic Primitives Library (cng.sys) runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request IRP (I/O request packet).
Tested configurations
  • Windows 10 Education May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]
  • Windows 10 Education May 2020 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [3]
  • Windows 10 Education November 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [2]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Dell Latitude 5290 with an Intel Core i7-8650U with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on a Samsung Galaxy Book 12" with an Intel Core i5-7200 with PAA [1]
  • Windows 10 Enterprise May 2019 Update (x64) running on an HP EliteBook x360 830 G5 with an Intel Core i5-8350U with PAA [1]
  • Windows 10 Enterprise May 2020 Update (ARM64) running on a Microsoft Surface Pro X with a Microsoft SQ1 with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Go 2 LTE with an Intel Pentium Gold 4425y with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i7-8650U with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core i3-1005G1 with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on a Panasonic Toughbook FZ 55 with an Intel Core i5-8365U with PAA [3]
  • Windows 10 Enterprise May 2020 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [3]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Go LTE with an Intel Pentium Gold 4415Y with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on a Samsung Galaxy Book 12" with an Intel Core i5-7200 with PAA [2]
  • Windows 10 Enterprise November 2019 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [2]
  • Windows 10 Home May 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [1]
  • Windows 10 Home May 2020 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [3]
  • Windows 10 Home November 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [2]
  • Windows 10 Pro May 2019 Update (x64) running on a Dell Latitude 12 Rugged Tablet with an Intel Core i5-8350U with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on a Samsung Galaxy Book 10.6" with an Intel Core m3-7Y30 with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [1]
  • Windows 10 Pro May 2019 Update (x64) running on an HP ZBook 15 G5 with an Intel Core i5-8400H with PAA [1]
  • Windows 10 Pro May 2020 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Dynabook TECRA-X50-F with an Intel Core i7-8565U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go 2 with an Intel Core m3-8100Y with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go LTE with an Intel Core i7-8665U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [3]
  • Windows 10 Pro May 2020 Update (x64) running on an HP ZBook 15 G6 with an Intel Core i7-9850H with PAA [3]
  • Windows 10 Pro May 2020 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [3]
  • Windows 10 Pro November 2019 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core m3-7Y30 with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on a Samsung Galaxy Book 10.6" with an Intel Core m3-7Y30 with PAA [2]
  • Windows 10 Pro November 2019 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [2]
  • Windows 10 Pro November 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [2]
  • Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2016 running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]
  • Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]
  • Windows Server Core (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]
  • Windows Server Core Datacenter May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]
  • Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R640 with an Intel Xeon Gold 6230 with PAA [3]
  • Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]
  • Windows Server Core May 2020 Update (x64) on Hyper-V Microsoft Windows Server 2016 running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]
  • Windows Server Core May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]
  • Windows Server Core May 2020 Update (x64) running on a Dell PowerEdge R7515 with an AMD EPYC 7702P with PAA [3]
  • Windows Server Datacenter Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]
  • Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]
  • Windows Server Datacenter November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2019 on Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]
  • Windows Server Datacenter November 2019 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]
  • Windows Server November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2016 on Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2]
  • Windows Server November 2019 Update (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2] (single-user mode)
Vendor Microsoft Corporation
References

This certificate's webpage directly references 3 certificates, transitively this expands into 4 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-128, AES-192, AES-256, AES-, RC2, RC4, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA384, SHA-2, SHA2, MD4, MD5, PBKDF, PBKDF2
Schemes
Key Agreement
Protocols
SSL, TLS, TLS 1.2, IKEv1, IKEv2, IKE, IPsec
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-521, brainpoolP160r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, Curve25519
Block cipher modes
ECB, CBC, CTR, GCM, CCM, XTS

Vendor
Samsung, Microsoft Corporation, Microsoft

Standards
FIPS 140, FIPS 140-2, FIPS 180-4, FIPS PUB 198-1, FIPS 197, FIPS 186-4, NIST SP 800-132, NIST SP 800-38F, NIST SP 800-38B, SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, SP 800-56A, NIST SP 800-56B, NIST SP 800-90A, NIST SP 800-108, SP 800-131A, NIST SP 800-135, NIST SP 800-133, NIST SP 800-56A, SP 800-135, SP 800-90A, NIST SP 800-131A, SP 800-132, SP 800-38F, SP 800-56B, SP 800-108, PKCS#1, RFC 2898

File metadata

Title Microsoft Security Policy Document
Subject FIPS Certification
Author Microsoft Corporation
Creation date D:20230419150704-07'00'
Modification date D:20230419150704-07'00'
Pages 54
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • 4457 - active - TCB Launcher
  • 4348 - active - Windows Resume
  • 4339 - active - Windows OS Loader
Incoming
  • 4536 - active - Cryptographic Primitives Library
  • 4537 - active - Virtual TPM

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 26.06.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf.

    The computed heuristics were updated.

    • The policy_processed_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}} data.
    • The module_processed_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['4537', '4536']}} data.
  • 18.05.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4515,
  "dgst": "136040f6ccedf6ee",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#C1363",
        "DSA#C785",
        "ECDSA#C1897",
        "Triple-DES#C785",
        "AES#C1897",
        "RSA#C1363",
        "KBKDF#C800",
        "RSA#C785",
        "HMAC#C785",
        "RSA#C1947",
        "KBKDF#C1949",
        "KBKDF#C1365",
        "RSA#C795",
        "SHS#C1897",
        "DRBG#C1897",
        "DRBG#C1363",
        "AES#C800",
        "Triple-DES#C1363",
        "CVL#C1897",
        "KAS#C785",
        "KAS#C1363",
        "DSA#C1897",
        "Triple-DES#C1897",
        "KAS#C1897",
        "DRBG#C785",
        "DSA#C1363",
        "SHS#C1363",
        "AES#C785",
        "AES#C1365",
        "KTS#C1365",
        "RSA#C1367",
        "KTS#C800",
        "CVL#C785",
        "AES#C1363",
        "KTS#C1949",
        "SHS#C785",
        "AES#C1949",
        "ECDSA#C785",
        "RSA#C1897",
        "ECDSA#C1363",
        "HMAC#C1897",
        "HMAC#C1363"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4537",
          "4536"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4348",
          "4339",
          "4457"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4537",
          "4536"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4348",
          "3923",
          "4339",
          "4457"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "4348",
        "4339",
        "4457"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4537",
          "4536"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4348",
          "4339",
          "4457"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "4537",
          "4536"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4348",
          "3923",
          "4339",
          "4457"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "4348",
        "4339",
        "4457"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 17
          },
          "ECDSA": {
            "ECDSA": 15
          }
        },
        "FF": {
          "DH": {
            "DH": 17,
            "Diffie-Hellman": 7
          },
          "DSA": {
            "DSA": 2
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CCM": {
          "CCM": 5
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 7
        },
        "GCM": {
          "GCM": 5
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1,
          "IKEv1": 8,
          "IKEv2": 6
        },
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 4
          },
          "TLS": {
            "TLS": 9,
            "TLS 1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP160r1": 2,
          "brainpoolP192r1": 2,
          "brainpoolP192t1": 2,
          "brainpoolP224r1": 2,
          "brainpoolP224t1": 2,
          "brainpoolP256r1": 2,
          "brainpoolP256t1": 2,
          "brainpoolP320r1": 2,
          "brainpoolP320t1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP384t1": 2,
          "brainpoolP512r1": 2,
          "brainpoolP512t1": 2
        },
        "Curve": {
          "Curve25519": 2
        },
        "NIST": {
          "P-256": 12,
          "P-384": 14,
          "P-521": 10
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#4339": 3,
          "#4348": 3,
          "#4457": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES CBC 128 and 256": 3,
          "AES- 192": 1,
          "AES- 256": 4,
          "AES-128": 13,
          "AES-192": 7,
          "AES-256": 10,
          "HMAC- SHA384": 1,
          "HMAC-SHA-18": 2,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "HMAC-SHA1": 6,
          "HMAC-SHA256": 2,
          "HMAC-SHA512": 2,
          "PKCS#1": 6,
          "PKCS1-v1_5": 1,
          "RSA PKCS#1": 6,
          "SHA 256": 2,
          "SHA 384": 1,
          "SHA- 256": 2,
          "SHA- 512": 1,
          "SHA-1": 17,
          "SHA-111": 1,
          "SHA-115": 1,
          "SHA-2": 2,
          "SHA-256": 21,
          "SHA-384": 10,
          "SHA-512": 11,
          "SHA1": 3,
          "SHA2": 1,
          "SHA384": 1
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 2
          }
        },
        "PBKDF": {
          "PBKDF": 7,
          "PBKDF2": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 17,
            "SHA1": 3
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 21,
            "SHA-384": 10,
            "SHA-512": 11,
            "SHA2": 1,
            "SHA384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 30
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 5,
          "FIPS 140-2": 11,
          "FIPS 180-4": 8,
          "FIPS 186-4": 11,
          "FIPS 197": 4,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "NIST SP 800-131A": 2,
          "NIST SP 800-132": 4,
          "NIST SP 800-133": 1,
          "NIST SP 800-135": 1,
          "NIST SP 800-38B": 1,
          "NIST SP 800-38D": 2,
          "NIST SP 800-38E": 4,
          "NIST SP 800-38F": 4,
          "NIST SP 800-56A": 2,
          "NIST SP 800-56B": 1,
          "NIST SP 800-90A": 3,
          "SP 800-108": 3,
          "SP 800-131A": 2,
          "SP 800-132": 5,
          "SP 800-135": 2,
          "SP 800-38C": 1,
          "SP 800-38F": 1,
          "SP 800-56A": 5,
          "SP 800-56B": 1,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS#1": 6
        },
        "RFC": {
          "RFC 2898": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 29,
            "AES-": 7,
            "AES-128": 13,
            "AES-192": 7,
            "AES-256": 10
          },
          "RC": {
            "RC2": 6,
            "RC4": 6
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 11
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6,
            "HMAC": 20,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 60,
          "Microsoft Corporation": 57
        },
        "Samsung": {
          "Samsung": 4
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Microsoft Corporation",
      "/CreationDate": "D:20230419150704-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled": "True",
      "/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method": "Standard",
      "/MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId": "72f988bf-86f1-41af-91ab-2d7cd011db47",
      "/ModDate": "D:20230419150704-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "FIPS Certification",
      "/Title": "Microsoft Security Policy Document",
      "pdf_file_size_bytes": 1004066,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.secg.org/sec2-v2.pdf",
          "https://cr.yp.to/ecdh/curve25519-20060209.pdf",
          "http://www.ecc-brainpool.org/download/Domain-parameters.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "https://www.microsoft.com/en-us/howtotell/default.aspx",
          "http://creativecommons.org/licenses/by-nd-nc/1.0/",
          "https://msdn.microsoft.com/en-us/library/aa375534.aspx",
          "http://www.openmobilealliance.org/tech/affiliates/wap/wap-261-wtls-20010406-a.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf",
          "https://learn.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-cryptderivekey",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4339",
          "https://global.ihs.com/doc_detail.cfm?\u0026item_s_key=00325725\u0026item_key_date=941231\u0026input_doc_number=ANSI%20X9%2E62\u0026input_doc_title",
          "https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/curvegen.pdf",
          "http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4457",
          "https://msdn.microsoft.com/",
          "https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation",
          "https://www.microsoft.com/en-us/windows",
          "http://www.gbstandards.org/GB_standards/GB_standard.asp?id=900",
          "https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-cryptography#cryptography-allowfipsalgorithmpolicy",
          "http://www.commoncriteriaportal.org/files/epfiles/Windows%2010%20AU%20and%20Server%202016%20GP%20OS%20Security%20Target%20-%20Public.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "8d10c5e075c9103e66283b858c2e137d05b43e35f776dd82efcbad18cec670b1",
    "policy_txt_hash": "5a9fed05278d4405237fc9d005283ca6e58f64447a66ac9ea1283d8de98734b2"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with modules Windows OS Loader validated to FIPS 140-2 under Cert. #4339 operating in FIPS mode, Windows Resume validated to FIPS 140-2 under Cert. #4348 operating in FIPS mode, or TCB Launcher validated to FIPS 140-2 under Cert. #4457 operating in FIPS mode.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf",
    "date_sunset": "2026-09-21",
    "description": "Kernel Mode Cryptographic Primitives Library (cng.sys) runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request IRP (I/O request packet).",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 2"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "4339": 1,
      "4348": 1,
      "4457": 1
    },
    "module_name": "Kernel Mode Cryptographic Primitives Library",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "10.0.18362[1], 10.0.18363[2] and 10.0.19041[3]",
    "tested_conf": [
      "Windows 10 Education May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
      "Windows 10 Education May 2020 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [3]",
      "Windows 10 Education November 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [2]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Dell Latitude 5290 with an Intel Core i7-8650U with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on a Samsung Galaxy Book 12\" with an Intel Core i5-7200 with PAA [1]",
      "Windows 10 Enterprise May 2019 Update (x64) running on an HP EliteBook x360 830 G5 with an Intel Core i5-8350U with PAA [1]",
      "Windows 10 Enterprise May 2020 Update (ARM64) running on a Microsoft Surface Pro X with a Microsoft SQ1 with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Go 2 LTE with an Intel Pentium Gold 4425y with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i7-8650U with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core i3-1005G1 with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on a Panasonic Toughbook FZ 55 with an Intel Core i5-8365U with PAA [3]",
      "Windows 10 Enterprise May 2020 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [3]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Dell Latitude 5300 2-in-1 with an Intel Core i7-8665U with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Go LTE with an Intel Pentium Gold 4415Y with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on a Samsung Galaxy Book 12\" with an Intel Core i5-7200 with PAA [2]",
      "Windows 10 Enterprise November 2019 Update (x64) running on an HP EliteBook x360 830 G6 with an Intel Core i7-8565U with PAA [2]",
      "Windows 10 Home May 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [1]",
      "Windows 10 Home May 2020 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [3]",
      "Windows 10 Home November 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [2]",
      "Windows 10 Pro May 2019 Update (x64) running on a Dell Latitude 12 Rugged Tablet with an Intel Core i5-8350U with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Book 2 with an Intel Core i7-8650U with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Go with an Intel Pentium Gold 4415Y with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Microsoft Surface Pro 6 with an Intel Core i5-8250U with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Panasonic Toughbook CF-33 with an Intel Core i5-7300U with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on a Samsung Galaxy Book 10.6\" with an Intel Core m3-7Y30 with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on an HP Slimline Desktop with an Intel Pentium J4205 with PAA [1]",
      "Windows 10 Pro May 2019 Update (x64) running on an HP ZBook 15 G5 with an Intel Core i5-8400H with PAA [1]",
      "Windows 10 Pro May 2020 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Dynabook TECRA-X50-F with an Intel Core i7-8565U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go 2 with an Intel Core m3-8100Y with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Go LTE with an Intel Core i7-8665U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Laptop 3 with an Intel Core i5-1035G7 with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [3]",
      "Windows 10 Pro May 2020 Update (x64) running on an HP ZBook 15 G6 with an Intel Core i7-9850H with PAA [3]",
      "Windows 10 Pro May 2020 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [3]",
      "Windows 10 Pro November 2019 Update (x64) running on a Dell Latitude 7200 2-in-1 with an Intel Core i7-8665U with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Laptop 2 with an Intel Core i5-8350U with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro 7 with an Intel Core m3-7Y30 with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Pro LTE with an Intel Core i5-7300U with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on a Microsoft Surface Studio 2 with an Intel Core i7-7820HQ with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on a Samsung Galaxy Book 10.6\" with an Intel Core m3-7Y30 with PAA [2]",
      "Windows 10 Pro November 2019 Update (x64) running on an HP ProBook 650 G5 with an Intel Core i7-8665U with PAA [2]",
      "Windows 10 Pro November 2019 Update (x86) running on a Dell Inspiron 660s with an Intel Core i3-2120 without PAA [2]",
      "Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2016 running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]",
      "Windows Server Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
      "Windows Server Core (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [1]",
      "Windows Server Core Datacenter May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]",
      "Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R640 with an Intel Xeon Gold 6230 with PAA [3]",
      "Windows Server Core Datacenter May 2020 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]",
      "Windows Server Core May 2020 Update (x64) on Hyper-V Microsoft Windows Server 2016 running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [3]",
      "Windows Server Core May 2020 Update (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell Precision 5810 with an Intel Xeon E5-1620 v3 with PAA [3]",
      "Windows Server Core May 2020 Update (x64) running on a Dell PowerEdge R7515 with an AMD EPYC 7702P with PAA [3]",
      "Windows Server Datacenter Core (x64) on Hyper-V on Microsoft Windows Server 2019 running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
      "Windows Server Datacenter Core (x64) running on a Dell PowerEdge R740 with an Intel Xeon Gold 6126 with PAA [1]",
      "Windows Server Datacenter November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2019 on Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]",
      "Windows Server Datacenter November 2019 Update (x64) running on a Dell PowerEdge R740 with an Intel Xeon Platinum 8268 with PAA [2]",
      "Windows Server November 2019 Update (x64) on Hyper-V on Microsoft Windows Server 2016 on Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2]",
      "Windows Server November 2019 Update (x64) running on a Dell PowerEdge R7425 with an AMD EPYC 7251 with PAA [2] (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-05-08",
        "lab": "LEIDOS CSTL",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}